Linksys AE1000 User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Linksys AE1000 User Guide User Guide Linksys AE1000 High Performance Wireless-N USB Adapter Linksys AE1000 Table of Contents Contents Chapter 1: Product Overview 1 LED 1 Chapter 2: Installation 2 Installation 2 Chapter 3: Wireless Network Configuration 4 Windows 7 4 Windows Vista 5 Windows XP 7 Appendix A: Troubleshooting 8 Appendix B: Specifications 9 Appendix C: Warranty Information 10 Limited Warranty 10 Appendix D: Regulatory Information 12 FCC Statement 12 FCC Radiation Exposure Statement 12 Safety Notices 12 Industry Canada Statement 13 Règlement d’Industry Canada 13 Wireless Disclaimer 13 Avis de non-responsabilité concernant les appareils sans fil 13 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) 14 Appendix E: Software End User License Agreement 15 Cisco Products 15 Software Licenses 15 High Performance Wireless-N USB Adapter ii Linksys AE1000 Chapter 1: Product Overview Chapter 1: Product Overview USB Extension Base The Adapter comes attached to its USB Extension Base Thank you for choosing the Linksys AE1000 High Using the Adapter in its Base may often improve wireless Performance Wireless-N USB Adapter Using the latest signal performance, especially with desktop computers wireless networking technology, the Adapter adds or that may be located under desks or tabletops upgrades wireless connectivity on your Windows-based desktop or laptop computer To help protect your data To use the USB Extension Base, make sure the Adapter and privacy, you can use Wi-Fi Protected Access 2 (WPA2) is connected to the Base, and then connect the USB encryption to protect your wireless connection Extension Base to a USB port on your computer or laptop LED Link (Blue) The LED flashes when there is wireless network activity Storing the Cap When the Adapter is plugged into the USB Extension Base or your computer’s USB port, you can store the cap by attaching it to the Adapter To store the cap, push it onto the top of the Adapter until it fits snugly High Performance Wireless-N USB Adapter 1 Linksys AE1000 Chapter 2: Installation Chapter 2: Installation 3 Read the Software End User License Agreement To accept the agreement and continue with the installation, click Next This chapter describes the procedure for installing the Adapter Installation To install the Adapter: 1 Insert the CD into your CD-ROM drive License Agreement 4 Insert the Adapter into an available USB port on your computer Insert CD 2 Click Set up your Linksys Adapter DVD/CD-RW Drive (E:) Linksys Router Setup Always do this for software and games: AutoPlay DVD/CD-RW Drive (E:) Linksys Adapter Setup Always do this for software and games:Install or run program Install or run program Set up your Linksys Adapter Published by Cisco Consumer Products LLC Set up your Linksys Adapter General options Open folder to view files Published by Cisco Consumer Products LLC using Windows Explorer Install Linksys AE1000 View more AutoPlay options in ControlGeneral Panel options Open folder to view files 5 An Easy Setup Key helps you quickly connect to your using Windows Explorer wireless hotspot or router If you do not have an Easy Speed up my system Setup Key, select No, I don’t have an Easy Setup Key using Windows ReadyBoost If you have an Easy Setup Key, select Yes, I have an Set AutoPlay defaults in Control Panel Easy Setup Key Click Next Set up Your Linksys Adapter NOTE: Cisco Valet wireless hotspots come with If you do not see this, access setup on the CD directly an Easy Setup Key Cisco Valet wireless hotspots To do so, perform the following steps for your specific and some Linksys routers also let you create one operating system: from your own USB flash drive (You do not need Windows 7 an Easy Setup Key to complete installation ) a Go to Start > Computer b Double-click your CD-ROM drive Windows Vista a Go to Start > Computer b Double-click your CD-ROM drive Windows XP a Go to Start > My Computer and select your CD-ROM drive b Double-click Setup.exe Do You Have an Easy Setup Key? If you do not have an Easy Setup Key, go to step 6 If you have an Easy Setup Key, go to step 8 High Performance Wireless-N USB Adapter 2 Linksys AE1000 Chapter 2: Installation 6 A list of available wireless networks appears Select 9 The installation is complete Click Close your network Click Next You are Now Connected to Your Wireless Network Connect to a Wireless Network 7 If your network does not use wireless security, go to NOTE: If you have any problems during the step 9 installation process, refer to the Frequently Asked Questions in the setup software, or use a If your network uses wireless security, enter the computer with an active Internet connection to wireless password for your type of security: visit www.linksys.com/support • Wired Equivalent Privacy (WEP): Enter the WEP key • Wi-Fi Protected Access (WPA/WPA2): Enter the passphrase (also known as a pre-shared key) Click Next Go to step 9 Enter the Wireless Password 8 Follow the on-screen prompts to use your Easy Setup Key Click Next Insert your Easy Setup Key High Performance Wireless-N USB Adapter 3 Linksys AE1000 Chapter 3: Wireless Network Configuration Chapter 3: Wireless Network 2 Select your network, and then click Connect Configuration To configure the Adapter’s wireless connection settings, use a wireless network configuration utility If you have installed such a utility on your computer, or if your computer came with one already installed, refer to that utility’s documentation for instructions on use Otherwise, follow the instructions in the appropriate section below to use your operating system’s built-in utility: Windows 7, page 4, Windows Vista, page 5, or Windows XP, page 7 Windows 7 After you have installed the Adapter, the Wireless Network Select Network Configuration utility icon appears on your computer’s system tray 3 If your network does not use wireless security, go to step 5 4 Enter the security key, Wired Equivalent Privacy (WEP) key, or Wi-Fi Protected Access (WPA/WPA2) passphrase (also known as a pre-shared key), depending on your Wireless Network Configuration Utility Icon type of security Click OK (If you do not see the icon, click the Show hidden icons arrow in the system tray ) When your mouse pointer hovers over the icon, the status information of your wireless connection appears Wireless Connection Status New Wireless Connection Secured Network To connect to a different wireless network: 5 This screen appears while the Adapter connects to 1 Click the Wireless Network Configuration utility icon A your network Do not cancel, unless you want to end list of available wireless networks appears the connection Connecting to Network NOTE: For help with the Wireless Network Configuration utility, refer to Help and Support Click Start > Help and Support Your computer is now connected to your Available Wireless Networks wireless network. High Performance Wireless-N USB Adapter 4 Linksys AE1000 Chapter 3: Wireless Network Configuration Windows Vista 3 Select your network, and then click Connect After you have installed the Adapter, the Wireless Network Configuration utility icon appears on your computer’s system tray Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears Select Network 4 If your network uses wireless security, go to step 5 If your network does not use wireless security, this screen appears To connect to your unsecured network, click Connect Anyway and go to step 7 Wireless Connection Status New Wireless Connection To connect to a different wireless network: 1 Right-click the Wireless Network Configuration utility icon 2 Click Connect to a network Unsecured Network 5 Enter the security key, Wired Equivalent Privacy (WEP) key, or Wi-Fi Protected Access (WPA/WPA2) passphrase Utility Menu (also known as a pre-shared key), depending on your type of security Click Connect Secured Network High Performance Wireless-N USB Adapter 5 Linksys AE1000 Chapter 3: Wireless Network Configuration 6 This screen appears while the Adapter connects to 9 This screen varies according to the selected location your network Do not cancel, unless you want to end Click Close the installation Network Settings Saved Connecting to Network 7 This screen appears when you are connected to your NOTE: For help with the Wireless Network network Select Save this network, if you want to save Configuration utility, refer to Help and Support your settings Click Close Click Start > Help and Support Your computer is now connected to your wireless network. Connected to Network 8 The Set Network Location screen may appear This screen helps apply the correct settings for your type of location Select Home, Work, or Public location Select Network Location High Performance Wireless-N USB Adapter 6 Linksys AE1000 Chapter 3: Wireless Network Configuration Windows XP 4 If your network uses Wired Equivalent Privacy (WEP) wireless security, enter the WEP Key in the Network key After you have installed the Adapter, the Windows XP and Confirm network key fields If your network uses Wireless Zero Configuration Utility icon appears on your Wi-Fi Protected Access (WPA/WPA2) wireless security, computer’s system tray enter the passphrase in the Network key and Confirm network key fields Click Connect Wireless Zero Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the
Recommended publications
  • Setting up the Linksys EA9300 Max-Stream AC4000 Tri-Band Wi-Fi Router
    Setting up the Linksys EA9300 Max-Stream AC4000 Tri-Band Wi-Fi Router Setting up the Linksys EA9300 Max-Stream AC4000 Tri-Band Wi-Fi Router is made easy using the Smart Setup wizard which is embedded in the router's firmware and is available even if the router does not have an internet connection or the router is on factory default settings. Before you begin: Make sure you have a working internet connection. Power on your modem and connect an ethernet cable from the modem to the internet port of the router. NOTE: If you are replacing an existing router, make sure to disconnect and remove the old one. Connect the power adapter to the router and turn it ON. Wait until the Linksys logo light is solid. Step 1: Connect a wireless computer, tablet or smartphone to the default Wi-Fi network of your router. The wireless credentials are located on a label at the bottom of the device. NOTE: If you need to set up the router using a hardwired computer, connect your computer to one of the ethernet ports at the back of the router. Step 2: Launch a supported web browser and enter “linksyssmartwifi.com” in the Address bar then press [Enter]. NOTE: You can also enter “http://192.168.1.1” or “myrouter.local”. Step 3: Check the box beside I have read and accepted the License Terms for using this software. Then click Next to proceed. NOTE: Open the link to know the license terms and other information. If you prefer to manually set up the router, click on the Manual configuration link.
    [Show full text]
  • Integrity Enhancements for Embedded Linux Devices
    Integrity Enhancements for Embedded Linux Devices David Safford [email protected] This material is based on research sponsored by the Department of Homeland Security (DHS) Science and Technology Directorate, Homeland Security Advanced Research Projects Agency, Cyber Security Division (DHS S&T/HSARPA/CSD), BAA 11-02 and Air Force Research Laboratory, Information Directorate under agreement number FA8750-12-2-0243. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of Department of Homeland Security, Air Force Research Laboratory or the U.S. Government. Embedded Linux Integrity ● Server $10K+ PB 4768 Crypto card Trusted and Secure Boot ● PC $1K TB TPM Trusted and Secure Boot (Win8) ● mobile $500 GB Restricted Boot ● embedded $50 MB Nothing ● Sensor $10 KB Nothing Example Embedded Linux Devices ● Pogoplug ● TP-Link MR3020 ● D-Link DIR-505 ● Linksys WRT54G MR-3020 Main Components Three main chips SoC (32 bit MIPS) RAM (32MB) SPI Flash (4MB) Partition Name Size Contents mtd0 “boot” 64KB u-boot mtd1 “kernel” 1024KB Linux Kernel mtd2 “rootfs” 2816KB Linux root filesystem mtd3 “config” 64KB config data mtd4 “ART” 64KB radio config data Recent Embedded Linux Vulnerabilities ● 2012: 4.5 Million home routers compromised in Brazil – https://www.securelist.com/en/blog/208193852/The_tale_of_one_thousand
    [Show full text]
  • WRT310N Wireless-N Gigabit Router
    USER GUIDE Wireless-N Gigabit Router Model: WRT310N About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: This globe icon indicates a noteworthy website address or e-mail address. Online Resources Website addresses in this document are listed without http:// in front of the address because most current web browsers do not require it. If you use an older web browser, you may have to add http:// in front of the web address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders. Wireless-N Gigabit Router i Table of Contents Chapter 1: Product Overview 4 Front Panel. 4 Back Panel . 4 Placement Positions . 4 Chapter 2: Wireless Security Checklist 6 General Network Security Guidelines . 6 Additional Security Tips . 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup .
    [Show full text]
  • Hacking Roomba®
    Hacking Roomba® Tod E. Kurt Wiley Publishing, Inc. Hacking Roomba® Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-470-07271-4 ISBN-10: 0-470-07271-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
    [Show full text]
  • C:\Users\John\Documents\Forums
    Network speed between a given system adapter and the network Router is determined by the slowest network device. If the Router is an N Router, then your adapter mode is set for G. The problem is likely your Intel AGN Adapter settings - it's Wireless Mode is likely set to G, B/G, or A/B/G, but the N Mode setting probably isn't Enabled, which overrides the other Wireless Modes. Prior to the procedures below, go to Linksys Support, look up your Router, then download the latest firmware update. If it's the same as what you have, then download that. Linksys Support Standard Procedure for any Linksys Router problem with speed or signal begins with flashing the firmware prior to adjusting any other settings. I've added settings for your Router to match your adapter since I have the same hardware. You can look for your Router's firmware update at Linksys Support Enter your Model # and go from there to get the firmware update. The following assumes you have a Linksys Single Band N Router; though these settings are from my Linksys WRT600N Dual-Band, the Admin Panel is the same, except for the extra 5ghz Band setup on mine. Just in case, I've also added the 5ghz settings. With these settings and the AGN or my Linksys WUSB600N DBN Adapter, I average better than 200mbps+, usually around 240 or 260mbps. The settings for the AGN adapter after these settings are matched for the Router settings. On your Router: Access the Router Admin Panel & Wireless Settings from your Browser - http://192.168.1.1/BasicWirelessSettings.htm 1.
    [Show full text]
  • Openwrtdocs - Openwrt
    OpenWrtDocs - OpenWrt Login OpenWrt OpenWrtDocs ● FrontPage ● OpenWrtDocs ● TableOfHardware ● RecentChanges ● FindPage Welcome to the new wiki version of the OpenWrt userguide. To get started, click a link below. About OpenWrt ● About OpenWrt ● Why should I run OpenWrt? ● OpenWrt Version History Installing OpenWrt ● Will OpenWrt work on my hardware ? ● Obtaining the firmware ● Installing OpenWrt ❍ General instructions (router specific instructions later) ❍ Linksys WRT54G and WRT54GS ■ Enabling boot_wait ■ Setting boot_wait from a serial connection ❍ ASUS WL-500G and WL-300G ❍ ASUS WL-500G Deluxe ❍ Siemens Gigaset SE505 ❍ Motorola WR850G ❍ Buffalo Airstation WLA-G54 ❍ Buffalo AirStation WBR2-G54S ● Using OpenWrt ● Troubleshooting http://openwrt.org/OpenWrtDocs (1 of 6)18.10.2005 14:57:04 OpenWrtDocs - OpenWrt Using OpenWrt ● Using OpenWrt for the first time ● Firstboot / jffs2 ● Editing Files ● ipkg ● Configuration OpenWrt Configuration ● NVRAM ● Network configuration ❍ Sample network configurations ❍ The ethernet switch ■ Normal Behavior ■ Using Robocfg ● Wireless configuration ❍ Basic settings ❍ WEP encryption ❍ WPA encryption ❍ Wireless Distribution System (WDS) / Repeater / Bridge ❍ OpenWrt as client / wireless bridge ● Software configuration ❍ System ■ dnsmasq ■ nas ■ wl ■ TimeZone and NTP ■ Crontab ■ PPPoE Internet Connection ■ Access to syslog ❍ Applications ■ httpd ■ socks-Proxy http://openwrt.org/OpenWrtDocs (2 of 6)18.10.2005 14:57:04 OpenWrtDocs - OpenWrt ■ uPnP ■ CUPS - Printing system with spooling ● Hardware ❍ LED OpenWrt
    [Show full text]
  • Session Initiation Protocol Server Implementation for Linksys Routers
    Session Initiation Protocol Server Implementation for Linksys Routers A Senior Project presented to the Faculty of the Computer Science department California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Bachelor of Science, Computer Science by Matthew Duder December, 2009 © 2009 Matthew Duder Abstract Session Initiation Protocol (SIP) is a signaling protocol used for network-based media interaction. SIP Servers are required to process and forward requests and responses between end clients. Once connection setup is complete, the end clients utilize some other protocol (such as Real-Time Transport Protocol) to complete their task. Such a server may be implemented and installed on routers. Unlike the SIP protocol, however, router development currently remains without standards. For this project, Linux-based residential-grade routers had their kernels replaced with an open source version. This allowed for installation of open-source development, such as a SIP server implementation. This project led to the development and installation of such a server application on two separate Linksys WRT54GL routers. After proper network configuration, these servers communicated with both local clients and each other. These servers forwarded SIP traffic and enabled voice communication over separate networks. i Table of Contents Abstract …………………………………………………………………………………………….i Overview…………………………………………………………………………………………...1 Technologies……………………………………………………………………………………….3 SIP Signaling Overview…………………………………………………………………………....5
    [Show full text]
  • Reportlinker Adds World Routers Market Report
    Reportlinker Adds World Routers Market Report. NEW YORK New York, state, United States New York, Middle Atlantic state of the United States. It is bordered by Vermont, Massachusetts, Connecticut, and the Atlantic Ocean (E), New Jersey and Pennsylvania (S), Lakes Erie and Ontario and the Canadian province of -- Reportlinker.com announces that a new market research report is available in its catalogue. World Routers Market http://www.reportlinker.com/p0109904/World-Routers-Market.html This report analyzes the worldwide markets for Routers in US$ Millions. The major End use markets analyzed are Service Providers, Enterprises, and Research/Education & Other Markets. The report provides separate comprehensive analytics for North America North America, third largest continent (1990 est. pop. 365,000,000), c.9,400,000 sq mi (24,346,000 sq km), the northern of the two continents of the Western Hemisphere., Europe, Asia-Pacific, and Rest of World. Annual forecasts are provided for each region for the period of 2006 through 2015. A five-year historic analysis is also provided for these markets. The report profiles 189 companies including many key and niche players worldwide such as 2Wire, 3Com Corporation, ADTRAN Inc., Alcatel-Lucent, Allied Telesis Allied Telesis is a telecommunications company, formerly Allied Telesyn. Headquartered in Japan, their North American headquarters are in Bothell, Washington, a suburb of Seattle. Inc., ASUSTeK Computer Inc., Belkin International Inc., Buffalo Technology (USA), Inc., Ciena Corporation Ciena Corporation NASDAQ: CIEN develops and markets communications network platforms and software, and offers professional services. The Company's broadband access, data and optical networking platforms, software tools, and global network services support worldwide telecom, Cisco Systems “Cisco” redirects here.
    [Show full text]
  • USER GUIDE Wireless-G Broadband Router with Speedbooster
    USER GUIDE Wireless-G Broadband Router with SpeedBooster Model No: WRT54GS About This Guide About Ths Gude Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: This globe icon indicates a noteworthy website address or e-mail address. Online Resources Most web browsers allow you to enter the web address without adding the http:// in front of the address. This User Guide will refer to websites without including http:// in front of the address. Some older web browsers may require you to add it. Resource Webste Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders. Wreless-G Broadband Router Table of Contents Chapter 1: Product Overview 1 Front Panel. 1 Back Panel . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . 2 Additional Security Tips .
    [Show full text]
  • Windows XP Power-Users Troll the Web, Documentation, and Friends for Useful Tips and Tricks--A Keyboard Shortcut Here, an Undocu
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • How to Cure the SP2 Upgrade Blues • Power Hound Tips for Online Protection Windows XP Power Hound By Preston Gralla Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00619-5 Pages: 400 Windows XP power-users troll the web, documentation, and friends for useful tips and tricks--a keyboard shortcut here, an undocumented double-click there to eliminate annoyances, save time, and take control of their Windows XP. There's an easier way. This insightful and amusing book is packed with hundreds of power tips, cool tricks, and workarounds in one organized, easy-to-use resource--for everything from the desktop to Office programs to the registry. < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • How to Cure the SP2 Upgrade Blues • Power Hound Tips for Online Protection Windows XP Power Hound By Preston Gralla Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00619-5 Pages: 400 Copyright The Missing Credits About the Author About the Creative Team Acknowledgments The Missing Manual Series Introduction How This Book Works Some Experience Required About These Arrows About MissingManuals.com Chapter 1. Getting Started Section 1.1. Startup and Shutdown Section 1.2. Controlling Your Monitor and Sounds Section 1.3. Individual Windows Tricks Section 1.4. User Accounts and Logons Chapter 2. The Desktop and Interface Section 2.1. Desktop Makeover Section 2.2. The Start Menu Section 2.3. The Taskbar Section 2.4. The Control Panel Section 2.5.
    [Show full text]
  • Federal Communications Commission WASHINGTON, D.C
    BEFORE THE Federal Communications Commission WASHINGTON, D.C. ) In the matter of ) ) Amendment of Parts 0, 1, 2, 15, and 18 of ) ET Docket No. 15-170 the Commission’s Rules Regarding ) Authorization of Radiofrequency ) Equipment ) ) Request for the Allowance of Optional ) RM-11673 Electronic Labeling for Wireless Devices ) COMMENTS OF LAURENCE BRETT (“BRETT”) GLASS, d/b/a LARIAT, A WIRELESS INTERNET SERVICE PROVIDER SERVING ALBANY COUNTY, WYOMING Laurence Brett (“Brett”) Glass, a sole proprietor doing business as LARIAT, a wireless Internet service provider serving Albany County, Wyoming, pursuant to Section 1.415 of the Commission’s Rules (47 C.F.R. §1.415), hereby respectfully submits the following comments in response to the Notice of Proposed Rule Making, FCC 15-92, released July 21, 2015 (the Notice)1, which proposes to modify the Commission’s rules regarding the evaluation, approval, marketing, and labeling of RF devices. LARIAT was the first of the many wireless Internet service providers (WISPs) now doing business within the continental United States. LARIAT provides high quality, high speed broadband Internet service to a large service area in rural Wyoming. LARIAT was originally founded as a nonprofit, 501(c)(12) rural telecommunications cooperative, and was taken private by its founder, Laurence Brett (“Brett”) Glass, at the request of the membership in 2003. An electrical engineer with an MSEE from 1Amendment of Parts 0, 1, 2, 15 and 18 of the Commission’s Rules Regarding Authorization of Radiofrequency Equipment, Notice of Proposed Rulemaking, 30 FCC Rcd 7725 (2015). Stanford University, Brett was present at the University during the TCP/IP transition and helped to modify computer hardware, software, and operating systems to interoperate with the ARPAnet and NSFNet, which in turn evolved into what is now the Internet.
    [Show full text]
  • Internet and Intranet Calling with Polycom
    Internet and Intranet Calling with PVX™ An Application Note October 18, 2004 © 2004 POLYCOM, INC. ALL RIGHTS RESERVED. POLYCOM, THE POLYCOM LOGO, PVX, VIAVIDEO, AND PEOPLE+CONTENT ARE REGISTERED TRADEMARKS OF POLYCOM, INC. IN THE UNITED STATES AND OTHER COUNTRIES. ALL OTHER TRADEMARKS ARE THE PROPERTY OF THEIR RESPECTIVE COMPANIES. INTERNET AND INTRANET CALLING WITH PVX™ Contents Before You Begin..................................................................................2 System Requirements........................................................................................................... 2 Installing PVX...................................................................................................................... 4 Activating Your PVX Software ................................................................................................ 4 Directory Setup ................................................................................................................... 4 Running the Setup Wizard....................................................................4 Setup for Calling Within an Intranet........................................................................................ 5 Setup for Calling Within a Virtual Private Network (VPN)............................................................ 5 Setup for Calling Through a DSL or Cable Modem ..................................................................... 8 Setup for Calling Through a Network Router ...........................................................................
    [Show full text]